Compromised Key Clause Samples

Compromised Key. If the private keys of a node are obtained, the adversary is able to obtain all previous keys and decrypt all previously recorded messages. There is no perfect forward secrecy. In addition, the BYka scheme is vulnerable to the compromised-key impersonation attack where, if a node C is compromised, an adversary E cannot only impersonate node C, it can also use the stolen keys to impersonate any other nodes to communicate with C. For example, node E has obtained node C’s keys. It impersonates node B and sends IDB to node C, which uses it to compute the pairwise key KCB. Unknown to C, node E also uses IDB with C’s private keys to compute the same pairwise key KCB.